KR102632546B1 - 소스 네트워크로부터 타겟 네트워크로 소프트웨어 아티팩트를 전송하기 위한 방법 및 시스템 - Google Patents

소스 네트워크로부터 타겟 네트워크로 소프트웨어 아티팩트를 전송하기 위한 방법 및 시스템 Download PDF

Info

Publication number
KR102632546B1
KR102632546B1 KR1020227039680A KR20227039680A KR102632546B1 KR 102632546 B1 KR102632546 B1 KR 102632546B1 KR 1020227039680 A KR1020227039680 A KR 1020227039680A KR 20227039680 A KR20227039680 A KR 20227039680A KR 102632546 B1 KR102632546 B1 KR 102632546B1
Authority
KR
South Korea
Prior art keywords
target network
software
software artifact
plug
request
Prior art date
Application number
KR1020227039680A
Other languages
English (en)
Korean (ko)
Other versions
KR20220165783A (ko
Inventor
잔-그레고르 피셔
Original Assignee
지멘스 악티엔게젤샤프트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 지멘스 악티엔게젤샤프트 filed Critical 지멘스 악티엔게젤샤프트
Publication of KR20220165783A publication Critical patent/KR20220165783A/ko
Application granted granted Critical
Publication of KR102632546B1 publication Critical patent/KR102632546B1/ko

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
KR1020227039680A 2020-04-17 2021-04-09 소스 네트워크로부터 타겟 네트워크로 소프트웨어 아티팩트를 전송하기 위한 방법 및 시스템 KR102632546B1 (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP20170134.9 2020-04-17
EP20170134.9A EP3896590A1 (de) 2020-04-17 2020-04-17 Verfahren und systeme zum übertragen von software-artefakten aus einem quellnetzwerk zu einem zielnetzwerk
PCT/EP2021/059246 WO2021209323A1 (de) 2020-04-17 2021-04-09 Verfahren und systeme zum übertragen von software-artefakten aus einem quellnetzwerk zu einem zielnetzwerk

Publications (2)

Publication Number Publication Date
KR20220165783A KR20220165783A (ko) 2022-12-15
KR102632546B1 true KR102632546B1 (ko) 2024-02-02

Family

ID=70390753

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020227039680A KR102632546B1 (ko) 2020-04-17 2021-04-09 소스 네트워크로부터 타겟 네트워크로 소프트웨어 아티팩트를 전송하기 위한 방법 및 시스템

Country Status (5)

Country Link
US (1) US20230179667A1 (de)
EP (2) EP3896590A1 (de)
KR (1) KR102632546B1 (de)
CN (1) CN115413343A (de)
WO (1) WO2021209323A1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4428984A1 (de) 2022-12-01 2024-09-11 LG Energy Solution, Ltd. Jelly-roll-elektrodenanordnung, verfahren zur herstellung einer jelly-roll-elektrodenanordnung und sekundärbatterie damit

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180032720A1 (en) * 2010-10-06 2018-02-01 Red Hat, Inc. Detection of malicious software packages

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8156488B2 (en) * 2004-10-20 2012-04-10 Nokia Corporation Terminal, method and computer program product for validating a software application
US20070094400A1 (en) * 2005-10-20 2007-04-26 Childress Rhonda L Software installation within a federation
US8544058B2 (en) * 2005-12-29 2013-09-24 Nextlabs, Inc. Techniques of transforming policies to enforce control in an information management system
WO2007120360A2 (en) * 2005-12-29 2007-10-25 Blue Jungle Information management system
US8090797B2 (en) * 2009-05-02 2012-01-03 Citrix Systems, Inc. Methods and systems for launching applications into existing isolation environments
US9002574B2 (en) * 2009-10-15 2015-04-07 Airbiquity Inc. Mobile integration platform (MIP) integrated handset application proxy (HAP)
US8942888B2 (en) * 2009-10-15 2015-01-27 Airbiquity Inc. Extensible scheme for operating vehicle head unit as extended interface for mobile device
EP2339459B1 (de) * 2009-12-22 2018-09-26 BlackBerry Limited Verfahren, System und Vorrichtung zur Installation von Software auf einer mobilen elektronischen Vorrichtung über einen Proxyserver
WO2013015835A1 (en) * 2011-07-22 2013-01-31 Seven Networks, Inc. Mobile application traffic optimization
US20130097660A1 (en) * 2011-10-17 2013-04-18 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
US8819772B2 (en) * 2012-06-25 2014-08-26 Appthority, Inc. In-line filtering of insecure or unwanted mobile device software components or communications
US8874761B2 (en) * 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US10348767B1 (en) * 2013-02-26 2019-07-09 Zentera Systems, Inc. Cloud over IP session layer network
US10225244B2 (en) * 2013-09-20 2019-03-05 Oracle International Corporation Web-based interface integration for single sign-on
WO2016061520A1 (en) * 2014-10-16 2016-04-21 Amazon Technologies, Inc. On-demand delivery of applications to virtual desktops
US10650154B2 (en) * 2016-02-12 2020-05-12 Sophos Limited Process-level control of encrypted content
WO2018004600A1 (en) * 2016-06-30 2018-01-04 Sophos Limited Proactive network security using a health heartbeat

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180032720A1 (en) * 2010-10-06 2018-02-01 Red Hat, Inc. Detection of malicious software packages

Also Published As

Publication number Publication date
CN115413343A (zh) 2022-11-29
KR20220165783A (ko) 2022-12-15
EP4107640C0 (de) 2024-01-31
US20230179667A1 (en) 2023-06-08
EP3896590A1 (de) 2021-10-20
EP4107640B1 (de) 2024-01-31
EP4107640A1 (de) 2022-12-28
WO2021209323A1 (de) 2021-10-21

Similar Documents

Publication Publication Date Title
CN111541785B (zh) 基于云计算的区块链数据处理方法及装置
US10341321B2 (en) System and method for policy based adaptive application capability management and device attestation
CN113691597B (zh) 区块链合约部署方法、装置、设备以及存储介质
CN110336810B (zh) 信息分享方法、平台、计算设备及存储介质
US11856106B2 (en) Secure configuration of a device
US9900161B2 (en) Method for certifying android client application by local service unit
US8417964B2 (en) Software module management device and program
CN111262889B (zh) 一种云服务的权限认证方法、装置、设备及介质
CN111108735A (zh) 资产更新服务
KR20140043068A (ko) 애플리케이션 증명을 위한 시스템 및 방법
CN112149105A (zh) 数据处理系统、方法、相关设备及存储介质
CN112235266B (zh) 一种数据处理方法、装置、设备及存储介质
CN115113970A (zh) 一种基于容器引擎的数据处理方法以及相关设备
CN111492355A (zh) 用于控制和/或监控装置的方法和控制系统
CN111800426A (zh) 应用程序中原生代码接口的访问方法、装置、设备及介质
CN111414640A (zh) 秘钥访问控制方法和装置
KR102632546B1 (ko) 소스 네트워크로부터 타겟 네트워크로 소프트웨어 아티팩트를 전송하기 위한 방법 및 시스템
US10033719B1 (en) Mobile work platform for remote data centers
Bradley et al. Towards characterizing iot software update practices
CN113228555B (zh) 用于统一安全配置管理的方法、系统和装置
US20170237716A1 (en) System and method for interlocking intrusion information
EP2793160A1 (de) Verfahren und Vorrichtung zur Prüfung einer Anwendung
CN115801292A (zh) 访问请求的鉴权方法和装置、存储介质及电子设备
CN114861144A (zh) 基于区块链的数据权限处理方法
KR20160137032A (ko) 네트워크 기기 간 원격 인증 장치 및 그 방법

Legal Events

Date Code Title Description
A201 Request for examination
A302 Request for accelerated examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant